×

Enforcing server authentication based on a hardware token

  • US 10,164,963 B2
  • Filed: 02/26/2016
  • Issued: 12/25/2018
  • Est. Priority Date: 10/23/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a hardware token from a client device, a chain of certificates comprising a server certificate and a first root certificate authority (CA) certificate, each certificate in the chain of certificates comprising a public key and a signature;

    verifying, by a cryptography application running in a memory of the hardware token, the chain of certificates by;

    verifying, in an iterative manner and starting with the server certificate as a selected certificate, a signature of the selected certificate using a next public key of a next certificate in the chain of certificates, wherein the next public key is considered authenticated and is added to a list of public keys upon the successful verification of the selected certificate;

    omitting authentication of the next public key and tagging the list of public keys as authenticated upon determining that the next public key is present in an authenticated list stored by the hardware token and has been used less than a predetermined number of times; and

    determining that the chain of certificates is verified in response to tagging the list of public keys as authenticated;

    authenticating, by the hardware token and based on the verified chain of certificates, a public key of the server certificate in the chain of certificates;

    encrypting, by the cryptography application, a secret message using the authenticated public key of the server certificate in the chain of certificates to obtain an encrypted secret message; and

    sending, by the hardware token, the encrypted secret message to the client device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×